This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Bitcoin breakthrough: security system for digital currency

12 September 2017

Leading IT security company Rohde & Schwarz Cybersecurity have announced the availability of its new Bitcoin protocol classification capabilities, provided by the deep packet inspection (DPI) engine R&S PACE 2.

The OEM software solution is now able to reliably detect and classify the Bitcoin protocol in network traffic in real time.

Bitcoin is a cryptocurrency and a digital payment system. Transactions are made peer-to-peer and are written directly on a distributed ledger named ‘blockchain’. The digital money is issued and managed without any central authority – meaning no governments or banks are involved. The virtual money can be exchanged for other currencies, products and services and shopping web sites accept cryptocurrencies as a method of payment.

With the new Bitcoin protocol classification capabilities provided by R&S PACE 2, vendors embedding the DPI engine in their network security and analytics solutions are now able to classify Bitcoin transactions within IP-based network traffic in order to fully understand how a network is utilised.

They can accurately and reliably identify Bitcoin network activities and implement security policies accordingly. This increases their visibility of and their control over potential security risks related to Bitcoin transactions.

The DPI software library R&S PACE 2 provides powerful and reliable detection and classification of thousands of applications and protocols by combining deep packet inspection and behavioural traffic analysis – regardless of whether the protocols use advanced obfuscation, port-hopping techniques or encryption. DPI is needed everywhere in the network where intelligent decisions need to be made based on the nature of IP traffic, whether it is wanted or unwanted traffic, good, or malicious.